Static task
static1
Behavioral task
behavioral1
Sample
2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636.exe
Resource
win10v2004-20240704-en
General
-
Target
2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636.exe
-
Size
148KB
-
MD5
8706e8235380b03b79f1d02bace40bd0
-
SHA1
d5297663d25a5863bf67ad4ec9e21b4b7631a2a0
-
SHA256
2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636
-
SHA512
a6ada5a1087431950a37adfa8910a0745eca8a9ef3f6dc7d5d764c24f9aa53896388cb74c1c50840a838002e957e2ab505b05c39b9c9ab896c5689b95ed3fcd2
-
SSDEEP
3072:hWeiLrT2ocGoqPs2lQBV+UdE+rECWp7hKtu:hurTjiBV+UdvrEFp7hKtu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636.exe
Files
-
2bba84df6ef754201c4f172c93591ce3e3da2de79a27465567ac4b112322b636.exe.exe windows:4 windows x86 arch:x86
796e8a3a6a59357dc579b989eea35777
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
VirtualFree
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualAlloc
SetVolumeLabelW
CloseHandle
DeviceIoControl
CreateFileW
GetVolumeInformationW
GetDriveTypeW
GetLogicalDriveStringsW
GetModuleFileNameW
GetWindowsDirectoryW
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleW
GetSystemInfo
GetProcAddress
GetVersion
FlushFileBuffers
LCMapStringW
SetFilePointer
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
RtlUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsGetValue
SetLastError
TlsAlloc
HeapReAlloc
LeaveCriticalSection
GetLastError
LocalFree
FormatMessageW
LCMapStringA
GetLocalTime
HeapFree
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapDestroy
HeapCreate
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
MessageBoxA
CreateDialogParamW
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
LoadImageW
DestroyWindow
DestroyIcon
PostQuitMessage
BeginDeferWindowPos
ScreenToClient
DeferWindowPos
EndDeferWindowPos
LoadMenuW
GetSubMenu
TrackPopupMenu
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DestroyMenu
GetWindowTextW
CharToOemBuffW
SetWindowLongW
IsDlgButtonChecked
GetDlgItemInt
CheckDlgButton
GetClientRect
GetParent
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadCursorW
SetCursor
GetDlgItemTextW
SetWindowTextW
GetDC
DrawTextW
ReleaseDC
GetDlgItem
EnableWindow
SendMessageW
MessageBoxW
ShowWindow
gdi32
GetTextMetricsW
SelectObject
comctl32
InitCommonControlsEx
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ